Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,286,830 papers from all fields of science
Search
Sign In
Create Free Account
Full disclosure (computer security)
Known as:
Full disclosure
, Full disclosure movement
In the field of computer security, independent researchers often discover flaws in software that can be abused to cause unintended behaviour, these…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Comparison of BSD operating systems
Computer security
Countermeasure (computer)
Data breach
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
A medical records managing and securing blockchain based system supported by a Genetic Algorithm and Discrete Wavelet Transform
A. F. Hussein
,
N. Arunkumar
,
G. Ramírez-González
,
E. Abdulhay
,
J. Tavares
,
V. Albuquerque
Cognitive Systems Research
2018
Corpus ID: 53770514
Review
2013
Review
2013
Diamond like carbon coatings for potential application in biological implants—a review
C. Love
,
R. Cook
,
T. Harvey
,
P. Dearnley
,
R. Wood
2013
Corpus ID: 53467352
Review
2012
Review
2012
Evolution: A View from the 21st Century
A. Wilkins
Genome Biology and Evolution
2012
Corpus ID: 5760401
Evolution: A View from the 21st Century, written by an eminent microbiologist–bacterial molecular geneticist, is an ambitious…
Expand
Highly Cited
2011
Highly Cited
2011
Natural Gas Operations from a Public Health Perspective
T. Colborn
,
C. Kwiatkowski
,
Kim Schultz
,
Mary Bachran
2011
Corpus ID: 53996198
ABSTRACT The technology to recover natural gas depends on undisclosed types and amounts of toxic chemicals. A list of 944…
Expand
Highly Cited
2010
Highly Cited
2010
Myths about Suicide
T. Joiner
2010
Corpus ID: 147849296
I confess, I am big fan of Dr. Thomas Joiner. In full disclosure, I consider him a friend. We correspond, we talk and we…
Expand
Review
2005
Review
2005
A Review of Probabilistic Risk Assessment of Contaminated Land (12 pp)
T. Öberg
,
B. Bergbäck
2005
Corpus ID: 18174116
AbstractBackground, Aims and Scope The management and decisions concerning restoration of contaminated land often require in…
Expand
Highly Cited
2003
Highly Cited
2003
FAIR VALUE ACCOUNTING AND THE MANAGEMENT OF THE FIRM
Benzion Barlev
,
Joshua Rene Haddad
2003
Corpus ID: 54756353
Highly Cited
2001
Highly Cited
2001
Asymmetric Information and Corporate Derivatives Use
Peter Dadalt
,
Gerald D. Gay
,
J. Nam
2001
Corpus ID: 6154657
We investigate the relationship between derivatives use and the extent of asymmetric information faced by the firm. Using…
Expand
Highly Cited
2000
Highly Cited
2000
A Game Theoretic Approach to Organic Foods: An Analysis of Asymmetric Information and Policy
J. McCluskey
Agricultural and Resource Economics Review
2000
Corpus ID: 37430478
Demand for healthy, safe, and environmentally friendly food products has been increasing. In response, producers are marketing…
Expand
Highly Cited
1989
Highly Cited
1989
Cognitively impaired subjects
L. Markson
,
L. Snyder
,
+16 authors
C. S. Lewis
1989
Corpus ID: 80540587
E thical questions regarding the use of human subjects in research are not new, but the special circumstances concerning…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE